Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    OpenVPN in server mode using TLS-crypt-v2 allows remote attackers to trigger a DoS by corrupting and replaying network packets in the early handshake phase

    Scheduled Pinned Locked Moved OpenVPN
    2 Posts 2 Posters 309 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J
      johnpitton
      last edited by

      Looks like 24.11 is on openvpn version (2.6.12) which is in-between 2.6.1 and 2.6.13, but the vulnerability is only for TLS-crypt-v2, which I don't believe 24.11 uses nor is there an option to enabled through the GUI that I can see. But I just wanted to confirm 24.11's OpenVPN isn't affected by this.
      ref: https://github.com/advisories/GHSA-5gwv-2q72-gxrm

      OpenVPN 2.6.12 amd64-portbld-freebsd15.0 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] [DCO]
      library versions: OpenSSL 3.0.14 4 Jun 2024, LZO 2.10
      DCO version: FreeBSD 15.0-CURRENT #0 plus-RELENG_24_11-n256407-1bbb3194162: Fri Nov 22 05:08:46 UTC 2024 root@freebsd:/var/jenkins/workspace/pfSense-Plus-snapshots-24_11-main/obj/amd64/AKWlAIiM/var/jenkins/workspace/pfSense-Plus-snapshots-24_11-main/sources/FreeBS
      Originally developed by James Yonan

      1 Reply Last reply Reply Quote 0
      • M
        maverick_slo
        last edited by

        I believe that is not affected.
        I can only see tls crypt (without V2) being enabled in my config.

        1 Reply Last reply Reply Quote 0
        • First post
          Last post
        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.